As a blogger and wanting a blog to be effective yet also exceptionable there are few points to take in consideration. First off, though there is no exact set blogging ethics, it is good to follow some as thumb of rule in order to save oneself from perils. Among some guiding principles includes referencing and crediting source or information gathered from other sources (Blood, 2002; Tan, 2007). In addition, one must remember to write with prudence as whatever that is published will be for the whole world to see (Tan, 2007; Ng, 2007).
In terms of blog design, one can adopt Kress and van Leeuwen (1998) theory of element layout, which is information value, salience and framing. MacDonald (2008) state a few pointers on effective blog design for instance modifying the blog template to make it look creative, include categories and search engines to facilitate navigation on the blog.
Kress, G & Van Leeuwen, T 1998, ‘Front pages: (the critical) analysis of newspaper layout’, in Approaches to media discourse, eds A Bell & Peter G, Blackwell, Oxford, pp. 186-219.
Just when we thought that Facebook was the ‘in thing’, a one of a kind, micro-blogging service, Twitter came about. Twitter (Dunlap & Lowenthal 2009, p. 130) communication between users to through answers to a simple question, ‘What are you doing?’. Consequently, users can update its followers with simple messages called ‘tweets’ that are like ‘I’m at McDonald’s now with Jerome and Kate’ or informing and sharing news like ‘Oh no! Limewire is no more!’. According to Twitter (2010) website, there are about 175 million registered users and there are 95 million tweets tweeted daily. In comparison to blogs, using Twitter to disseminate information is faster and more immediate because unlike blogs, Twitter lets you post things within the 140 words count limit. Thus, updates are short and can be posted in an instant. Blogs on the other hand, are normally longer in content and therefore is not as immediate.
However, like many other online social sites, Twitter is also exposed to fraudulence of identity accounts. A case for example was the surface of Dalai Lama’s Twitter account which turned out to be a fake (Owens, 2009). Owens also reports that the fake account apparently managed to collect almost 20,000 followers and representatives of Dalai Lama were only notified about the issue two days later.
Dalai Lama on Twitter? Source: www.thefirstpost.uk
Theft Identity is something that is common especially in the United States. Identity Theft Statistics (2010) reports that are more than 30 million victims of theft identity in the past 5 years. Within a year, at least 10 million Americans falls victim to theft Identity (Identity Theft Statistics, 2009). Even celebrities and renowned people are not safe from theft identity. As mentioned before was the case of Dalai Lama. But on top of that are other many high profile cases, like lead singer of Paramore, Hayley Williams had her account hacked and a nude picture of her posted up. Besides that, Britney Spears also unfortunately had her account broken into and a defamatory tweet regarding her privates was posted. So moral of the story is that one must be wary about that no online social networking site is safe from theft identity.
Hayley Williams after the incident. Source: www.zeitgeistyreport.com
Dunlap, JC & Lowenthal, PR, ‘Tweeting the Night Away: Using Twitter to Enhance Social Presence’, Journal of Information Systems Education, vol. 20, no. 2, pp. 129-135.
The New Straits Time (2010) reports a Malaysian blogger by the name of Aduka Taruna, who offended many people with his derogatory remark on the passing of the sultan of Johor was taken into custody. Taruna whose controversial post received more than 1000 comments of which were mostly comments expressing discontent to the point that he was threatened and was reported to authorities for drastic measure to taken against him. However, Taruna removed his post and made a public apology for his deed but even despite his effort, his apology was taken to be also offensive. The blogger now is he hiding after receiving death threats and according to Bernama, the Malaysian Communications and Multimedia Commission (MCMC) will investigate and probe the case.
There’s nothing wrong in owning a blog and anyone who has one has are entitled exercise their freedom of speech but one must be careful what is said as it can destroy. As Wack (1995) cited Blackstone (1830), who affirmed, in regards to press freedom, that an individual indisputable right speak publicly their thoughts but warns against those who mentions anything seditious and out of line will have to be ready to face the music. They are of course certain rules or guidelines if you will, that will work for the advantage of both readers and bloggers.
There are many of these ‘guidelines’ or ‘ethics’ and after seeing a going through a few by different authors, I realized some of them shares something in common and I have summarize them together. Firstly, it is always important to take into consideration that before posting anything up, a blogger must understand that whatever is posted up, will be visible and available for the whole world to see and that personal rants will about someone will not make your blog favourable (Ng, 2007; Tan, 2007). The Multimedia Super Corridor (MSC) provides a guarantee of no censorship of the Internet under the 10-pont Multimedia Bill of Guarantees (George, 2005). In spite of that, it does not mean that we can just blatantly say whatever is on our mind. This is where sensibility and common sense comes in. Like Taruna, who is an adult should know better than to speak blasphemy and worst to a honourable person who passed. A quote by Lord Chesterfield, a British Statesman in the late 16th Century sums up the importance of speaking with prudence saying,
"There is nothing that people bear more impatiently, or forgive less, than contempt: and an injury is much sooner forgotten than an insult."
REFERENCES:
George, C 2005, ‘The Internet's Political Impact and The Penetration/Participation Paradox in Malaysia and Singapore’, Media, Culture & Society, vol. 27, no. 6, pp. 903–920.
Lord Chesterfield 2010, BrainyQuote, viewed 11 November 2010, .
With all the new technologies booming here and there, some things that are considered cultural and traditional are forced to transform to keep up with this fast paced world. A case in point is books. Books have been around for a very long time since the Egyptians came out with the papyrus roll (Britannica Online, 2010).
An ABC (2010) broadcast reports on the how the market for virtual books is seen an upturn in the past year caused by the recent launch of Amazon’s Kindle Book and to top it off, Apple’s Ipad. The report included various figures in publishing world and technology: Steve Jobs (Apple Computers), Stephen Page (Faber and Faber) and Michael Tamblyn (Kobo e-Books). Among some of the things discussed in the report was the advantages of e-books has over traditional books. In addition, the discussion included how book publishers who opposed e-books are now looking into making their books digital and also the how the current book catalogues only satisfy the American market.
What exactly is an E-book? Larson (2010) describes it as ‘a digital reading device stores hundreds of books, newspapers, magazines, and blogs; allows for quick look-up of information through its built-in diction- ary, Wikipedia, or internal search capabilities; and offers customizable settings to suit each unique reader.’ Examples of e-book devices include Amazon Kindle, Sony Reader and just recently, Apple’s iPad.
Sony Reader. Source: www.engadget.com
Amazon Rekindle. Source: www.sync-blog.com
I believe that e-books will slowly replace our books. Like how music tapes players like Sony’s WALKMAN was superseded by Apple’s revolutionary music player, the iPod that can hold thousands of music in MP3 format. So it would not be a surprise if that trend occurs with books. Considering the younger generation brought up in a world whereby communication is no more linear but a combination of many; texts, graphics, images, sounds and videos. Thus, not only will e-book replace the physicality of reading a book but the essence of the content. Armstrong (2008) talks about how e-books can allow the incorporation video clips and text and simple communication with the author.
Moreover, e-books saves space as you only need one device to contain collections of books purchased and e-book eliminates the hassle to go out and buy books when it one can browse through hundreds of book without having to go anywhere and purchase it immediately. As one of the satisfied owner of e-book in the report by ABC (2010) stated, ‘It's like having a book shop in the palm of your hands.’
Apple's iPad and preview of its e-book function. Source: www.topmediatool.com
REFERENCES:
Armstrong, C 2008, ‘Books in a virtual world : The evolution of the e-book and its lexicon’, Journal of Librarianship and Information Science, vol. 40, no. 3, pp. 193-206.
In a ABC (2010) news article, it reports how the popular social networking site, Facebook confessed to breaching privacy of their users through its application. There are applications in Facebook that disseminates information about the user to advertising companies.The information includes not just the Facebook user’s names but also to the extent of the names of the user’s friends and is used create a comprehensive database so that the people can be tracked online.
I believe that every individual who join Facebook or any other online social networking sites, understand that your personal information is required after all that is a nature of social sites. As Taraszow et. al (2010), stated,‘nobody is really forced to join social networking sites (SNS), create a profile and reveal personal information…’.Taraszow et. al (2010) also adds that Facebook encourages users to post their contact details, personal interest, work and educational background. The choice to reveal personal information however lies solely on the individual and that most individuals are aware of the consequences of revealing personal data but are just ignorant.
Benhard et. al ( 2009) reveals how other studies conducted on social networking have found that users who claim they understand and prudent towards privacy prove otherwise with their actual steps taken to protect their personal information. A case in point, that we can explore this duplicity is accepting friend request on Facebook. Benhard et. al (2009)further explains in their study where they found that despite subjects in their studies assert understanding and benefit of privacy settings, they still accept ‘friends’ they barely know and thus have a large group of these ‘friends’ which has access to their personal data. This deliberate ‘ignorance’ can be seen in how despite, permission to access personal information request from application in Facebook, people still just click away in agreement without understanding their action. Jones & Soltren (2005) in their study discovered that 347 out of their 390 respondents had never read Facebook’s Privacy Policy.
Example of permission request from Facebook applications. Source: im.about.com
Another example of a permission request. Source: www.erictric.com
Kirkpatrick (2010) in his report, quote Mark Zuckerberg the founder of Facebook, who said that people nowadays are more comfortable with sharing information with the public and that it is a social norm that has evolved over time. There is some truth in that as it is an innate desire for people to want to connect. However that desire has seemed to render our judgement poor about privacy. Boyd (2008) state that privacy is a right and to exist it should be safeguarded structurally and socially. Ultimately, it is an individual’s responsibility to find out policies of the social sites and their choice to reveal or allow access to their personal information.
Boyd, D 2008, ‘Facebook's Privacy Trainwreck : Exposure, Invasion, and Social Convergence’, Convergence: The International Journal of Research into New Media Technologies, vol. 14, no. 1, pp. 13-20.
Taraszow, T, Aristodemou, E, Shitta, G, Laouris, Y & Arsoy, A 2010, Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook™ profiles as an example’, International Journal of Media & Cultural Politics, vol. 6, no. 1, pp. 81-101.
Before, information was always in printed form, be it newspapers, magazines or books. But now, with the introduction of Internet to our lives, information takes on an evolution too; now readily and easily access digitally. We can see this with newspapers, magazines or radio stations having a website to cater those goes online more would rather retrieve news online. In contrast to printed documents, new media is a major leap in how information is presented. Walsh (2006) describe it as ‘multimodal texts’ whereby there is an incorporation of different modes: images, music, moving images and either written or verbal communication. These other elements add flair to what we read and interpret, making it more interactive and fun.
Sites such as Youtube and Twitter, redefines the way information and news are retrieved. Here, Naughton (2006) states that our generation where Internet plays a dominant role are influenced by ‘pull’ technology. Instead of just being a passive audience and absorb information fed to us, we now do the opposite; we seek for information we want. The Guardian (2010) reports how blogs were resorted by journalists when their newspapers were ceased. In addition, British parties are looking into using Facebook, Twitter and Youtube to aid their political campaigns since the success of Barack Obama’s online strategy. Sifry (2010) concludes that the Internet, if not monitored will gain precedence in election campaigns. The Internet is a favourable as it is fast, has mass audience, diverse and rich in networking. (Naughton, 2006).
Walsh, M 2006, ‘The 'textual shift': Examining the reading process with print, visual and multimodal texts’, Australian Journal of Language and Literacy, vol. 29, no. 1, pp. 24 – 37.
Our world is built upon layers of communities. It is inherent to the way we humans interact and socialize. Community gives us a sense of belonging and identity. So it is of no surprise the existence of a blogging community. There is no exact definition of what blogging community is. However, the word ‘community’ according to TheFreeDictionary (2010), means ‘a group of people having common interests’; ‘similarity or identity’. Owyang (2007) describes it as “Online communities are bodies of people joined together by a common interest”. Thus, we can deduce that a blogging community is where people interact and share the same interest in blogging and blogs.
A blogging community is created is when you have constant viewers. According to Wordiq (2010), constant commenters of a blog are described to be the blog’s community.
In order to get a blog to have constant commenters, it is important to have the blog recognized. This can be achieved by viewing other blogs of interest and leave a comment (eHow, 2010). By doing the former, it will eventually lead other viewers or bloggers to notice and follow your blog. Of course other methods would involve utilizing ‘tags’. Tags are brief description or labels to assist in searching for information (NZherald, 2006; Flickr, 2010).
An illustration of a blogging community is Jeff Ooi’s blog. In his blog, not only does he allows comment boxes for interaction but allows viewers to use social networking sites to such Facebook, a microblog; Twitter, a social news website; Digg and Really Simple Syndication (RSS) feeds. These tools allow viewers to circulate and share his post. Consequently, this enlarges his 'community' of followers to his blog.
There are many various form of blogs and can be categorized according to different aspects such as topic and blog type. For example, under the category of topic, there are personal blogs which was predominant when blog first appeared (Smich, 2010), then eventually came political, business, topical, literary and health blogs just to name a few (Cho, 2004). On the other hand, under the aspect of blog types would include vlog; a video blog, spam blog; a spam based blog, photoblog or phlog; a blog made mostly of photos, j-blog; blog by a journalist, and Multiblog; a conversational blog between two or more people (wiki, 2010).
In ‘The Taxonomy of Blogs’ by Simons (2008), she mentions there are nine kinds of blog. Namely, there are pamphleteering blog, the diary, digest blog, advocacy blog, popular mechanics blog, exhibition blog, gatewatcher blog, advertisement blog and news blog. In comparison to other sources I have found regarding groupings of blogs, I have found some similarities. For instance, ‘diary blog’ Simons (2008) and ‘personal blog’ (Cho, 2004) are blogs whereby users put up posts of personal rants, events, thoughts and activities. Next, ‘exhibition blog’ (Simons, 2008) are blogs created by those in arts and music, like photographers, artistes and writers with desire to share their creation online. ‘Exhibition blog’ can be compared to a photoblog. From my observation, Cho’s method of classification is limited to the subject matter of blogs. Meanwhile, Simons’s method is more comprehensive and takes in not just subject matter but accounts of other elements such as the format, style and audience.
At one point, the Internet world or anyone who had Internet access was struck with the ‘blog’ fever. Suddenly everyone wanted or already had a blog of their own. So what is a blog actually? According to Britannica (2010), The word ‘blog’ comes from the words ‘web blog’ and a blog is space whereby thoughts, activites or events are recorded and posted by individuals, groups or companies. In other words, blog can be said to be an online diary. Tim Bernes-Lee is believed to be the first person to create a ‘blog’ although some beg to differ as their interpretation of blog is contrasting.
According to to Blogpulse (2010), there are a total of 147,199,651 and the numbers are escalating with approximately 70,000 new blogs each day (Britannica, 2010). With that big number of blogs, there is no doubt the existence of regional blogging trends. For example in Malaysia, it is common to come across blogs that disccuses political issue like the famous Raja Petra Kamaruddin (RPK) blog. Though according to a survey by Rice Blogger (2009) the top three blogs in Malaysia as of 2009, were not political blogs but rather, on technology, automobiles and how-to. In U.S however according to Technorati Top 100 (2010), The Huffington Post, a news blog sits at the top followed by two technology related blogs.
RPK’s blog is always known to criticize the Malaysian politics and government. Despite the credibility of the information he shares, RPK’s blog offers the Malaysian citizen an alternative form of news. On top of that, RPK’s blog has also bring much transparency and shed light unto the insides of the government.
Maybe you've seen your colleague's or friend's presentation and was amazed by how good their presentation was. Maybe you feel you could do the same but just don't know how. But that's about to change.
First off, the content of presentation must be cogent and coherent. Though there is no absolute measure of what's right or wrong in writing, writing credibly is important to cater to the various readers and conditions (Putnis & Petelin, 1996). According to Marquez (2010), it is important to keep the content concise; stating only important points related to the topic. This ensures that the presentation will not meander and does not become to draggy and wordy. Rothman (2005) supports this stating that 'technical writing should be specific and include all relevant details'.
Next, comes the design of the document which does plays a major role to keep your audience glued to what you're presenting. Among the elements to be considered are the use of graphics and images for example like charts and photos. Images and graphics serves as an assistance to the audience to comprehend and utilize information in the document (Reep, 2006). On top of that, Russell (2010) mentions that graphics and images makes the presentation interesting and different. This makes it less likely for your audience to fall asleep too. The flow of the presentation is important thus there must be consistency. Both Reep (2006) and Russell (2010) stresses to take note that people read from left to right. This should be taken advantage of to have a proper arrangements of points. Reep (2006) also pointed out important elements such as margins, indentations and typeface in order to achieve a smooth flow of the sequence.
An example of arrangement of information.
Source: Presentation slides from IPD
As you can see from the image above, the heading is accentuated in bold and the font size is bigger than the pointers below it.
Source: Presentation slides from IPD
The image above complies to Rothman's (2005) principle of keeping the information concise and specific.
Source: Presentation slides from IPD
This image above follows Reep's (2006) theory of incorporating images to assist in explaining the data. The image above shows how is image is place side by side which shows for comparison. On the other hand, the slide is not clutter with many text as this gives the presenter the opportunity to explain in further details.
Peter, P & Petelin, R 1996, 'Writing to communicate', Professional communication : principles and applications, Ch. 7, pp. 223-263
Reep, DC 2006, 'Document Design', Technical Writing, Ch. 6, pp. 133-172 Russel, W 2010, 10 Tips for Creating Successful Business Presentations, About.com: Presentation Software, viewed 26th August 2010, <>>
So exist this blog that will discuss issues pertaining to various and plethora of issues in the world of publication and media. Who's going to read this? You. You now who's reading this and probably is working or studying in the field of design, publication, media or communications.